Unit 8 lab

I need below paraphrased so that it shows less than 10% on turnitin.com. Please provide the report.

A VPN is a Virtual Private Network that enables a remote user to have control over a

networked server or system securely. There are 3 different types of VPN servers; a Tunnel VPN, a

Transport VPN, and a Passthrough VPN. In this week’s lab was all about the difference between

secure and non-secure file transfers as well as how to configure a VPN Client to work with a

PFsense VPN Server. This is extremely important to know because being able to safely transfer files

without having them intercepted is part of what we are learning in Cybersecurity. I had issues

setting up the connection properly and then connecting the PC to the VPN. Luckily I was able to

figure it out and the accomplishment of setting up the first connection and seeing that it is up and

running is great. I do want to learn how to input codes within the command prompt without

instructions. I feel like that the basics should be taught when learning these things. The second part

of the lab was also about the secure and non-secure transfer of files but went a little more in-depth

with Wireshark. I was able to analyze the traffic coming through the VPN server through the use of

Wireshark and the filter function which was able to separate all of that traffic to whatever I

specified. Overall I learned a lot through this lab. I hope in future classes we get a more in-depth

hands-on experience of setting up these servers.

Essay

5G Technology. 

 5 pages (excluding title page, references), single-spaced, single-column, and 11pt Times Roman font. Each page has a 1-inch margin on all sides. The first line of each paragraph must indent by 0.25in. 

Data Mining

1. Discuss in detail the following data mining tasks. For each task, make sure to discuss what the task does, three real-life applications, and three algorithms.   (Your answer goes in the answer sheet and MUST be at least one and a half pages, single spacing). 

A. Association rules

B. Classification 

C. Clustering

D. Anomaly Detection

2. In your own words, discuss the Hierarchical clustering, its types and 3 real-life applications (Your answer goes in the answer sheet and MUST be at least half a page, single spacing) 

Explore Networking in the Cloud

  

CCA 625 Project 1: Networking in the Cloud Technical Report Template

The report will consist or a technical review, and Step 5 and 7 lab reports.

The technical review part of the report should be eight to 12 pages long, and should cover the following topics:

  1. Internet      Protocol (IP):

a. Packet switching

b. IP addressing

c. DNS

d. IP routing

  1. IP Subnetting

a. IP address classes

b. CIDR notation

c. Multiple subnets in a LAN

d. Subnetting proposal for BallotOnline offices

  1. Transmission      Control Protocol (TCP)

a. TCP connections

b. Ensuring transport reliability

c. TCP sliding windows

  1. Software-Defined      Networking

a. SDN definition and purpose

b. OpenFlow definition and purpose

c. How SDN will help BallotOnline cloud deployment

In addition, resubmit both Project 1 lab reports, with incorporated feedback from Steps 5 and 7 if any.

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

week-9 assignment

 Write about the Joseph Schumpeter’s concept of creative Destruction For example, many think that the introduction of self-driving cars will disrupt the job market for drivers.